jacksonhoyt7532 jacksonhoyt7532
  • 03-03-2020
  • Computers and Technology
contestada

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Respuesta :

FreshPrinxce
FreshPrinxce FreshPrinxce
  • 03-03-2020

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Answer Link

Otras preguntas

how do you do expanded form in three ways to the number 37,917,545
What is a list of events in the order in which they took place
i need the results of 27?3?5?2=19
If 2i + (x + yi) = 6, what is x + yi? I know i ask alot but please help me solve this
What were the provisions of the Treaty of Paris (1783)
One day, 758 people visited the monkey house at the zoo. What is 758 rounded to the nearest hundred?
how can you use properties to solve equations with variables on both sides
what might cause someones mental map of a place to change
how does vegetation allow greater infiltration
Why the right kidney sit lower than the left?